<?xml version="1.0" encoding="utf-8"?> 
<rss version="2.0"
  xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
  xmlns:atom="http://www.w3.org/2005/Atom">

<channel>

<title>Oleg Andreev: posts tagged cryptography</title>
<link>https://oleganza.com/tags/cryptography/</link>
<description>Software designer and crypto-anarchy historian. about • twitter • telegram</description>
<author></author>
<language>en</language>
<generator>Aegea 11.4 (v4171e)</generator>

<itunes:owner>
<itunes:name></itunes:name>
<itunes:email>oleganza@gmail.com</itunes:email>
</itunes:owner>
<itunes:subtitle>Software designer and crypto-anarchy historian. about • twitter • telegram</itunes:subtitle>
<itunes:image href="https://oleganza.com/pictures/userpic/userpic-square@2x.jpg?1686684482" />
<itunes:explicit>no</itunes:explicit>

<item>
<title>The renaissance of cryptography</title>
<guid isPermaLink="false">20</guid>
<link>https://oleganza.com/all/renaissance-of-cryptography/</link>
<pubDate>Fri, 12 Oct 2018 22:35:20 +0000</pubDate>
<author></author>
<comments>https://oleganza.com/all/renaissance-of-cryptography/</comments>
<description>
&lt;p&gt;This is a declaration of a new era.&lt;/p&gt;
&lt;p&gt;Cryptography was almost exclusively a military technology for centuries. When in 1990s millions of personal computers connected to the internet, cryptography graduated from a munition to an industrial tool to secure credit card payments over a global, open and hostile environment.&lt;/p&gt;
&lt;p&gt;For the next 20 years cryptographic research and engineering was very vibrant, but culminating in a loud confirmation by Edward Snowden that the &lt;b&gt;resulting products were not good enough&lt;/b&gt;. SSL, PGP and other protocols turned out to be insecure, their implementations were buggy and hard maintain, all cryptographic primitives are broken and/or easy to misuse (MD5, RC4, RSA). High-level protocols were full of design and engineering mistakes and full of misunderstandings. The whole discipline had a culture of &lt;a href="https://youtu.be/Gs9lJTRZCDc?t=47m58s"&gt;abstinence-only cryptography&lt;/a&gt; and, as a result, poor engineering standards mixed with academic hubris and sabotage by the governments. 20 years of real-world cryptography produced a few useful artifacts and a lot of mess.&lt;/p&gt;
&lt;p&gt;Then, three things started to happen:&lt;/p&gt;
&lt;p&gt;First, &lt;b&gt;personal computers and the internet reached very deep into lives of almost everyone&lt;/b&gt;. Individuals now store their entire life in affordable pocket computers, businesses run all their operations over the internet, governments routinely participate in cyberwars. The importance of securing information shifted from “good to have” to “actively desirable”. Apple, the most valuable corporation on Earth, is selling billions of computers with _security_ and _privacy_ as a one of their main selling points.&lt;/p&gt;
&lt;p&gt;Second, &lt;b&gt;Bitcoin and blockchains happened&lt;/b&gt;. Things envisioned by Nick Szabo, Hal Finney, Wei Dai, Tim May and other cypherpunks back in 1990s finally started to materialize. The internet discovered a whole new continent: with “wild west” anarchy, “gold rushes”, and massive real and fictional opportunities. On that continent the excellence in cryptography is no longer simply desirable, but becomes vitally important: the unauthorized access to data now equates to the immediate loss of unbounded amount of highly liquid assets.&lt;/p&gt;
&lt;p&gt;Finally, a &lt;b&gt;new generation of software engineers has grown up&lt;/b&gt;, who have an enormous enthusiasm to fix mistakes of the past and bring cryptographic engineering to a new level: with clean designs, excellent documentation, record-breaking performance, safety and usability, and, most importantly, strong ethics.&lt;/p&gt;
&lt;p&gt;Today we have &lt;b&gt;robust cryptographic building blocks&lt;/b&gt; that are not only safer and faster, but also designed to be composable and extensible to build on top of them with confidence: such as &lt;a href="http://keccak.team/"&gt;Keccak&lt;/a&gt;, &lt;a href="https://github.com/miscreant/miscreant/wiki/AES-SIV"&gt;AES-SIV&lt;/a&gt; and &lt;a href="https://ristretto.group"&gt;Ristretto&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We have &lt;b&gt;better programming languages&lt;/b&gt; (Rust, Go, Swift) where engineering can be done with clarity, safety and ease. Pure Rust libraries such as &lt;a href="https://miscreant.io"&gt;Miscreant&lt;/a&gt; and &lt;a href="https://dalek.rs"&gt;Dalek&lt;/a&gt; set a new bar for all cryptography engineers.&lt;/p&gt;
&lt;p&gt;For the first time ever, the &lt;b&gt;ambitious ideas of zero-knowledge proofs&lt;/b&gt; that were stuck in academic papers for many years are finally implemented for the blockchain applications: &lt;a href="https://z.cash"&gt;Zcash&lt;/a&gt;, &lt;a href="https://elementsproject.org/elements/confidential-transactions/"&gt;Confidential Transactions&lt;/a&gt;, &lt;a href="https://getmonero.org"&gt;Monero&lt;/a&gt; and &lt;a href="https://crypto.stanford.edu/bulletproofs/"&gt;Bulletproofs&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We are living in a renaissance era of cryptography: &lt;b&gt;we have fantastic tools, amazing people and strong demand for high-quality cryptographic products with direct financial incentives&lt;/b&gt;. We are now at a lift-off point: we have a strong foundation to build upon with confidence. Now is the best time ever to learn and work with cryptography. Expect truly transformative technologies come out of this mix in the coming years.&lt;/p&gt;
</description>
</item>

<item>
<title>Assets is the new cryptographic primitive</title>
<guid isPermaLink="false">33</guid>
<link>https://oleganza.com/all/assets-is-the-new-cryptographic-primitive/</link>
<pubDate>Tue, 28 Mar 2017 08:00:00 +0000</pubDate>
<author></author>
<comments>https://oleganza.com/all/assets-is-the-new-cryptographic-primitive/</comments>
<description>
&lt;p&gt;Computer science and applied cryptography in particular, has a hierarchy of building blocks, where higher-order blocks are composed of lower-order blocks.&lt;/p&gt;
&lt;p&gt;Roughly, the hierarchy looks like this:&lt;/p&gt;
&lt;ol start="1"&gt;
&lt;li&gt;Charge and current in electric circuits&lt;/li&gt;
&lt;li&gt;Bits&lt;/li&gt;
&lt;li&gt;Bytes &amp; words&lt;/li&gt;
&lt;li&gt;Data structures&lt;/li&gt;
&lt;li&gt;Permutations: block ciphers, hash functions&lt;/li&gt;
&lt;li&gt;Self-authenticated data structures (e. g. hash-trees)&lt;/li&gt;
&lt;li&gt;Symmetric encryption and authentication&lt;/li&gt;
&lt;li&gt;Public key cryptography: digital signatures, shared secrets, asymmetric encryption.&lt;/li&gt;
&lt;li&gt;Certificates and chains of trust (e. g. X.509, PGP web of trust)&lt;/li&gt;
&lt;li&gt;Timestamped append-only logs (e. g. Certificate Transparency)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Blockchain protocols are made of these building blocks in order to offer a new kind of a building block: the &lt;b&gt;digital asset&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;Digital assets simplify and expand some schemes that struggle with lower-level primitives such as digital signatures and certificates.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In money:&lt;/b&gt; digital assets are bearer instruments that can be exchanged between parties that do not trust each other, while signatures only facilitate point-to-point exchange between trusting parties.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In supply chains:&lt;/b&gt; digital assets represent certificates of acceptance enabling end-to-end security for each participant in the supply chain, automating provenance and improving security of payments. E. g. a payment can be locked by condition that a particular set of certificates are produced, instead of deferring it to a third party escrow, increasing the surface of vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In consumer payments:&lt;/b&gt; digital assets are used to represent not only payment instruments (cash, rewards, loyalty points), but also receipts and sometimes products themselves (tickets and prepaid cards).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;In things:&lt;/b&gt; digital assets represent access tokens to devices running tamper-resistant computers that can be efficiently delegated, used as a collateral, bought and sold. E. g. lockboxes, vending machines and cars.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What about smart contracts?&lt;/b&gt; Aren’t those the next higher-order primitive? Not quite. Smart contracts use formal language to describe context-specific policy, so their impact depends on that context. Smart contracts inside a public key infrastructure (e. g. certificates) enable more sophisticated signing rules, but only within limitations and assumptions of such infrastructure. Smart contracts that control digital assets take advantage of their bearer instrument nature secured by entire blockchain network that acts as very slow and very secure computer. Smart contracts are important, but play a supportive role in systems built on top of digital assets.&lt;/p&gt;
&lt;p&gt;Whenever you wonder how could a blockchain protocol help with a given problem, reframe the question in terms of digital assets. &lt;b&gt;If there is something that can be defined as a digitally transferrable thing and benefit from automation and improved security of such transfers, then you have a reason to consider blockchain as part of your design.&lt;/b&gt; If not, then blockchain is probably not what you need: it would be either irrelevant (e. g. health records on blockchain) or grossly inefficient (e. g. arbitrary computation environment).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Originally &lt;a href="https://blog.oleganza.com/post/158936776253/assets-is-the-new-cryptographic-primitive"&gt;published&lt;/a&gt; on March 28, 2017&lt;/i&gt;&lt;/p&gt;
</description>
</item>


</channel>
</rss>